First published: Thu Aug 23 2018(Updated: )
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | <6.40.9 | |
MikroTik devices | <6.42.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1158 is classified as a medium severity vulnerability due to its potential to cause service disruption.
To fix CVE-2018-1158, update your MikroTik RouterOS to version 6.40.10 or later, or version 6.42.8 or later.
CVE-2018-1158 affects all MikroTik RouterOS versions before 6.40.10 and 6.42.8 that are vulnerable to this stack exhaustion issue.
CVE-2018-1158 is associated with an authenticated remote attack that exploits recursive parsing of JSON.
The potential consequences of CVE-2018-1158 include crashing the HTTP server, which can lead to denial of service.